CVE-2025-38123
BaseFortify
Publication date: 2025-07-03
Last updated on: 2025-11-20
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's network driver for wwan (wireless wide area network) devices, specifically the t7xx driver. When handling napi rx polling requests, the network device (netdev) might have already been released due to a disconnect operation. However, the driver still attempts to use this invalid netdev during packet processing, which leads to a kernel panic caused by a NULL pointer dereference.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to panic and crash when the affected driver processes network packets after the network device has been disconnected. This can lead to system instability, denial of service, and potential disruption of network connectivity on affected systems.